Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (4): 77-86.doi: 10.11959/j.issn.2096-109x.2022043

• Topic: Blockchain System, Smart Contract and Application Security • Previous Articles     Next Articles

Blockchain covert communication scheme based on the cover of normal transactions

Pengkun JIANG1, Wenyin ZHANG1, Jiuru WANG1, Shanyun HUANG1,2, Wanshui SONG1,2   

  1. 1 School of Information Science and Engineering, Linyi University, Linyi 276000, China
    2 School of Information Science and Engineering, Shandong Normal University, Jinan 250358, China
  • Revised:2022-07-07 Online:2022-08-15 Published:2022-08-01
  • Supported by:
    The Natural Science Foundation of Shandong Province(ZR2020MF058)

Abstract:

With the development of computer technology, the situation of modern network attack and defense is becoming increasingly severe, and the problem of secure transmission of secret information needs to be solved urgently.Covert communication technology embeds secret information into the carrier and transmits the information safely through the covert channel.However, the traditional covert channels face the challenges of data damaging, attack, detection and so on, which cannot meet the higher security requirements.As a public data platform, blockchain can embed secret information under the cover of a large number of transactions.With its tamper proof, anonymity, decentralization and other characteristics, blockchain can well solve the problems of traditional covert channels and achieve secure covert communication.However, the existing blockchain covert communication schemes are limited by low communication efficiency and poor security.How to improve safety and efficiency of covert communication is a research focus of blockchain covert communication.Motivated by this issue, a blockchain covert communication scheme based on the cover of normal transactions was proposed.The hash algorithm was used to build a transmission-free password table to embed secret information without changing any transaction data.Using the elliptic curve feature, transactions with hidden information can be quickly screened out from a large number of transactions, to extract secret information quickly.This scheme improves the security and efficiency of covert communication and has strong portability.Theoretical analysis shows that attackers cannot distinguish between ordinary transactions and special transactions.This scheme has high anti-detection and scalability.Besides, the experimental results of the bitcoin test network show the high efficiency of this scheme.

Key words: blockchain, covert communication, information hiding, bitcoin, hash algorithm

CLC Number: 

No Suggested Reading articles found!